BACK to Main Junkmail Page
CDT working group on UCE report to FTC
FOREWORD
This document reflects the work of the Ad-Hoc Working Group on Unsolicited
Commercial Email. The recommendations offered reflect the Working Group's
efforts to reach consensus on appropriate first steps to address the
problems associated with unsolicited commercial email (UCE). Many of the
participants have additional views on UCE that are not encompassed in this
report. The recommendations do not necessarily represent the views of the
organizations with which the participants are associated. We encourage you
to contact the participants to learn more about the issue and their
position; a list of organizations, companies and individuals who
participated in meetings is provided at the end of the report.
ACKNOWLEDGEMENTS
As the coordinator of the Ad-Hoc Working Group on Unsolicited Commercial
Email and primary drafter of this report, I would like to thank all the
participants for their tireless effort to listen to opposing points of
view, express their own views clearly, grapple with complex technical and
legal issues, and work to forge consensus where many thought none existed.
I am especially grateful for: the technical expertise provided by Paul
Hoffman and Lorrie Faith Cranor; the efforts of Roger Cochetti and Glee
Cady to keep us focused on the big picture; the consumer-oriented focus
brought by Ram Avrahami; and the thoughtful comments provided by Jill
Lesser, Jim Halpert, Rachel Luxemburg, Ron Plesser and Ray Everett-Church.
Finally, my thanks, and those of the participants, go out to CDT interns
Zachary Brown, Jacob Remes, Ernest Miller, and Adam Scoville whose
research, writing and editing made this report possible.
Deirdre K. Mulligan
INTRODUCTION
The Federal Trade Commission's June 1997 Workshop on Consumer Privacy
marked the beginning of a focused discussion of the problems associated
with unsolicited commercial email (UCE). The testimony and statistics
presented to the FTC provided a basis from which to search for solutions
to what most workshop participants, analysts, and email users have
identified as a problem that is, at present, unlikely to be solved by
market forces alone. Comments and presentations before the FTC detailed
the independent and collective efforts, involving nearly every segment of
the online population, to address the problems arising from unsolicited
commercial email. [1]
The half-day workshop on unsolicited commercial email documented the
frustrations of email users - both individuals and businesses - with the
growing clutter of unsolicited messages in their in-boxes. It documented
the growing burden that unsolicited commercial messages place on Internet
service providers. It raised important questions about the future of email
- will it be a useful medium for a variety of communications or will it be
overrun by an onslaught of unsolicited, and often fraudulent, commercial
messages?
Several areas of consensus emerged during the FTC's workshop.
* A desire to maximize individual email users' control over the
information that enters their in-boxes. The majority of proposals put
forth focused on providing individuals with the ability to gain more
control over the range of commercial messages they receive.
* A desire to ensure that costs were not unfairly imposed upon end users,
and Internet and online service providers.
* A desire for increased government action to combat fraudulent
unsolicited commercial email. Participants welcomed increased enforcement
of existing FTC regulations and state laws regarding unfair, deceptive and
misleading commercial statements.
* A belief that, to date, technology, self-regulatory efforts and
case-by-case legal action have had a limited impact on unsolicited
commercial email.
* A desire to deal with the problems associated with unsolicited
commercial email in ways that respect the First Amendment rights of
Internet users and the speech enhancing potential of the Internet.
Most of the FTC workshop participants were focused on the cost shifting
and intrusiveness of UCE, rather than on the commercial nature of the
communication. While unsolicited commercial messages are currently the
problem, several participants noted that the quantity of the messages,
their unsolicited nature and the cost shifting were the source of
complaints and problems independent of the content of the message.
Participants recognized that proposed solutions to these
content-independent problems may have First Amendment implications.
Most of the FTC participants supported rules - be they guidelines or
legislation - requiring commercial messages to have accurate headers and
domain names and to include accurate contact information within the text
of the commercial message. Participants identified forged addresses and
domain names as the source of innumerable problems, ranging from the
system overloads caused by mis-routed replies to the damage caused to the
reputation of individuals and companies when they are portrayed as the
sender of UCE. Akin to requiring accurate return address information on
postal mail, participants viewed accuracy as an important step in
addressing the costs incurred by recipients of UCE.
Beyond the areas of fraud prevention and requiring "return address"
accuracy, a diversity of proposals and views was presented to the FTC.
Proposals ranged from extending existing models for addressing unsolicited
commercial messages in other media, such as the Telephone Consumer
Protection Act (banning unsolicited commercial faxes) and self-regulatory
"opt-out" mechanisms for telephone and mail solicitations, to reliance on
"filters" and other technical mechanisms to screen out and block unwanted
email.
Despite the wide agreement on the nature of the problem, participants in
the FTC forum did not unite around a single solution. However, at the
urging of then-Commissioner Varney, participants agreed to undertake a
collaborative effort to identify workable solutions to the problems
arising from unsolicited commercial email.
Over a ten month period, under the coordination of the Center for
Democracy and Technology (CDT), many participants in the FTC's workshop on
unsolicited commercial email, joined by other interested parties, explored
the issue of UCE, reviewed proposals and identified a range of potential
solutions. The initial goal of CDT's Ad-Hoc Working Group on Unsolicited
Commercial Email (Working Group) was to provide a venue for in-depth
exploration of the problems initially identified at the FTC workshop.
Participants in the Working Group agreed early on that developing workable
solutions required a nuanced understanding of the technical aspects of the
Internet and email, the impact of UCE on network operators and end users,
the "harms" identified during the FTC workshop, and the legal and
technical tools currently available to address UCE, as well as respect for
First Amendment values. The Working Group was briefed by outside experts
and fellow participants on a range of topics, including the workings of
email and various email filtering programs, the prosecution of email fraud
and the genesis of current legislative proposals. This process has enabled
the Working Group to hone in on the key issues that must be addressed by
any UCE solution.
This report documents the progress, findings and recommendations of the
Working Group. The goal of the Working Group and this report is twofold.
The report attempts to provide a factual basis for efforts to address UCE.
The report begins by establishing the specific issues raised by UCE and
then considers the extent to which the various legal, technical and
self-regulatory approaches proposed to date address these issues. The
analysis offers both a review of general approaches and, where
appropriate, comments on specific proposals. Throughout its analysis, the
Working Group attempted to identify other policy considerations that
should be considered in evaluating the feasibility and suitability of
proposed solutions. In conclusion, the report puts forth a set of
recommended actions that the Working Group as a whole believes should be
taken in this area.
The report consists of five sections:
* Section Iprovides context by outlining the scope of the report, and
discussing characteristics of the Internet relevant to the discussion of
UCE.
* Section II outlines the impact on users and network operators of
unsolicited commercial email.
* Section III surveys and analyzes the legal and technical tools available
to address UCE.
* Section IV reviews and analyzes several key legal, technical and
self-regulatory proposals under consideration to address UCE.
* Section V contains recommendations.
I. DEFINING THE PROBLEM IN CONTEXT
A. Unsolicited Commercial Email: what this report is and is not about.
The focus of this report is unsolicited commercial email. While
recognizing that many of the issues associated with UCE arise due to its
unsolicited and bulk qualities and not its commercial content, the Working
Groups' focus has been on UCE for two reasons: the majority of unsolicited
email messages today are commercial; and focusing on UCE allowed the Group
to steer clear of the legal issues associated with other forms of speech,
such as unsolicited political email messages.
While informal estimates indicate that today roughly half of unsolicited
commercial email messages contain fraudulent or deceptive content, the
other half containing truthful commercial messages also raise issues that
need to be addressed. There are laws on the books to combat fraud,
regardless of whether it is conducted through the mail, over the phone, or
on the Internet. Non-fraudulent UCE messages are a more complex issue, and
they are a focus of this report. On the one hand, such messages are
truthful speech protected in the United States like other speech, albeit
less strongly, by the First Amendment. On the other hand, messages that
are truthful in content, but include intentionally inaccurate email header
information, make up a very large volume of Internet traffic and unwanted
messages in end users' mailboxes today. A new wrinkle emerges from the
events of recent months that reveal many of the issues associated with UCE
arise when companies or organizations send unsolicited email in bulk
regardless of its content. [2]
The issue and the solutions ultimately chosen to address UCE touch on core
civil liberties concerns and have ramifications for the future of the
Internet. UCE-oriented policies could have a negative impact on online
speech and individual privacy or other unintended consequences for the
Internet.
B. The Internet Environment
Implementing policy in a global, networked environment presents a series
of challenges. Effective responses to UCE in international networks must
respond to several considerations: the increased generation and
collection of information by a growing number of entities, the ease of
crossing national borders, and the lack of centralized control mechanisms.
1. The ease of expressing ideas and sharing information.
Email is a powerful medium for expressing ideas, supporting commerce,
sharing opinions, and receiving information. As the Supreme Court decision
Reno v. ACLU [3] recognized, the Internet offers new opportunities to
maximize individuals' ability to choose the opinions and ideas worthy of
attention and adherence. Across the globe, email is spanning distances and
cultures by facilitating the exchange of knowledge, ideas, opinions,
products and services. Email is an inexpensive way for advocates,
activists and marketers to spread "the word," whatever it may be. The
breadth of information and opinions available, the ability to communicate
en-masse, as well as one-to-one, and the speed with which information can
be disseminated, views expressed and appropriate action prompted (if they
can be harnessed) bode well for a more informed, active and concerned body
politic in the 21st Century. Commercial messages and commercial
solicitations can play an important role in informed consumer choices and
commerce. However, the unbridled use of email for unsolicited commercial
messages may hamper both the Internet's commercial potential and undermine
the very First Amendment values that enable UCE. Soberingevidence of the
damage that can result is provided by numerous news groups that have grown
silent due to the influx of UCE and the harvesting of participants' email
addresses.
2. Low barriers to access.
As the Internet and the World Wide Web expand to become a major
international means of communication and commerce, use of email to
communicate about social, political and commercial activities will
increase. The availability of low-cost trial, even free, email accounts
allows some individuals to engage in email marketing at virtually no cost.
As structured today, email can offer a method of disseminating one's
opinion or commercial message nearly devoid of start-up costs compared to
other forms of direct communication, such as telephone and mail. In
addition, the availability of email addresses, which can be purchased or
"harvested" using email trolling programs from postings and online chat
areas, greatly facilitate UCE. The relative lack of access barriers is a
great strength of the Internet; however, it also aids those engaged in the
practice of sending unsolicited bulk messages (commercial or other). When
considering programs aimed at UCE, every effort should be made to preserve
the open environment that gives the Internet so much of its vibrancy.
Solutions should also be examined for the disparate impact that they may
have on smaller and start-up companies in comparison to large, established
companies.
3. The ease of crossing national borders.
In a global network environment, information crosses national borders and
individuals interact with entities outside national borders with great
ease. The Internet allows information, including email, to flow quickly
and seamlessly from one nation to the next without passing through
checkpoints and permits individuals to interact with entities outside
national borders. National laws may be insufficient, on their own, to
provide citizens with relief from UCE due to the global nature of the
medium. As many have said, the global nature of the Internet may
drastically limit the effectiveness of policy decisions, unless they
reflect broad consensus and are implemented and enforced in a fashion that
addresses the Internet's characteristics.
4. The lack of centralized control mechanisms.
Unlike many communications systems, the Internet does not have central
points of control. The decentralized nature of the Internet allows it to
cope with problems and failures in any given computer network by simply
routing in another direction. This makes the Internet quite robust.
However, the lack of readily available centralized control mechanisms may
frustrate those seeking to regulate activities on the network. [4]
Sometimes a rogue action or policy of a single computer network can
cripple a collective effort at governance. Broad agreement on goals, and
coordinated action, are necessary to deal effectively with pressing
Internet issues.
5. The ability to place individuals' in control of their network
interactions.
Client-side controls present new opportunities to empower individuals. The
Internet continues to shift control over interactions away from the
government and large private sector companies. The ability to build
protections - against UCE, other objectionable content, or for privacy -
into the user interface with the network offers the opportunity to allow
individuals to craft protections that shield them regardless of the
jurisdictional law and policy. Providing individuals with the technical
means to control email may pave the way for protections that are as
decentralized and ubiquitous as the networks themselves. Such tools place
individuals, rather than network operators or governments, in a position
to decide which incoming email messages are acceptable.
Developing methods of implementing and enforcing policies that respond to
the decentralized, global and borderless nature of international networks
is essential. Additional technological solutions and efforts at
self-governance may be valuable supplements to the traditional top-down
methods of implementing policy and controlling behavior (e.g.,
international agreements, national legislation, or self-regulatory codes
of conduct) which may offer incomplete responses to the issue of UCE in
the global information infrastructure. While finding consensus on
appropriate policy is a first step, in a networked environment structuring
effective implementation becomes nearly as complex as reaching policy
consensus. Effective monitoring on this vast scale may tax the resources
of those responsible for enforcing policies - be they international
bodies, state and local governments or trade associations.
Addressing the flow of UCE along this international network may require
new tools for implementing policy. For this reason, those seeking
solutions to the problems associated with UCE have examined the ability of
law, self-regulation and technology, independently and in consort, to
address this issue.
II. issues raised by unsolicited commercial email
Internet users, Internet Service providers ("ISPs" or "service providers")
and, most recently, policy-makers have identified unsolicited commercial
email, particularly when sent in bulk, as a problem of serious consequence
for the Internet. Although complaints about unsolicited commercial email
differ from users to ISPs to network providers, there has been an effort
to identify the issues that any effective UCE-oriented policy must
address. These issues grow out of the adverse consequences of UCE. The
harms commonly identified by users and ISPs as stemming from the influx of
unsolicited email fall in three broad categories: invasion of individual
privacy; unfair cost shifting; [5] and misappropriation of facilities.
A. Impact on users
The primary issues raised by unsolicited commercial email voiced by
Internet users are that:
* it intrudes upon individual privacy;
* identifying and deleting unwanted messages places a burden on the
individual's limited time; and,
* it inappropriately imposes costs on individuals in the form of
connection time and server and disk storage space among others. [6]
These complaints can be separated into three general categories of
concern:
* Privacy concerns - from where did they get my email address, why are
they intruding into my home?
The privacy interests [7] of recipients of unsolicited commercial
solicitations have motivated both federal and some state governments to
enact limits on such communications in media ranging from face-to-face
communications (door-to-door solicitations), [8] postal mail, [9]
telephone, [10] and facsimile. [11] In the U.S., privacy is protected
through a loose framework of statutes, common law actions, and industry
codes of conduct. Many of the laws and regulations limiting unsolicited
communications have been the subject of litigation. The privacy of
recipients has been found to support some limits on unsolicited commercial
solicitations, but the First Amendment rights of both commercial speakers
to communicate and of individuals wishing to receive such solicitations
have led courts to find differing levels of regulation permissible
depending upon the characteristics of the medium. In reviewing
restrictions, courts have paid special attention to the amount of control
individuals can exercise over content, the medium's invasive nature, [12]
and to other harms claimed by the unwilling recipient, such as the ability
of the medium to shift costs onto the recipient or its interference with
the individual's ability to receive desired communications.[13]
Similar to the discussions and debates surrounding other forms of
unsolicited marketing, unsolicited commercial email has at times been met
with complaints by individuals who object to receiving unsolicited and
unwanted communications, frequently at their own expense. UCE containing
messages or "pointers" to Web sites that contain information that is
considered offensive, particularly information and images that parents
consider inappropriate for their children, appears to be on the rise. Such
UCE raises additional privacy concerns as it undermines parents' ability
to protect their children from content they deem inappropriate.
* Opportunity costs - measurable by loss of productivity, where the
dedication of resources to dealing with unsolicited commercial email
interferes with the ability of the individual to engage in another task.
By far the soft costs most frequently cited by email users are the
diversion of time and loss of productivity due to unsolicited commercial
email. Depending on the effectiveness of filtering techniques and the
email package employed by an individual or business, unsolicited
commercial email can take anywhere from no time to several minutes to deal
with. In considering the soft costs attendant to unsolicited email, a
number of additional factors must be included in the calculus beyond the
simple act of deleting unsolicited commercial email. For example, users
who download their email to a remote computer instead of reading it at the
service provider "waste" additional time during the download of
unsolicited commercial email. Similarly, time taken to respond to and
unsubscribe from email lists in order to avoid future mail, or to report
unsolicited commercial email to an ISP, where it is in violation of a term
of service, can be significant. Finally, as it is likely that unsolicited
commercial solicitations are a contributing factor in many recent
slowdowns of Internet email, a significant soft cost is the interference
with timely receipt of wanted material (see service providers section
below).
* Hard costs - measurable in dollars of resources, access fees, or storage
costs. [14]
Given that those who do not wish to receive UCE outnumber those who do by
a very wide margin, the net hard costs to end users should be considered
as well. Hard costs vary tremendously, depending upon the Internet
connection, pricing scheme, email program and other variables of the email
connection of the uninterested end user. For some Internet users, online
access is not a free, flat-rate telephone call. For those users, the meter
is ticking when they are downloading, reading, or even deleting without
reading, unsolicited commercial email. For businesses that use email, the
cost of processing UCE through internal mail systems can be quite high.
There has been much discussion in the market about the pricing of Internet
access. With some ISPs, the amount of time a user is connected to the
system is metered. Even at a low rate, reading and deleting unsolicited
commercial email costs the user money. In some localities, connect time
can be quite expensive. [15] In areas of the country that lack high speed
access due to poor telecommunications connections, the additional time
spent downloading UCE can add up quickly. On the flip side, many larger
ISPs have begun offering, and users have embraced, flat-rate pricing.
Flat-rate pricing avoids imposing the cost of UCE directly on users.
However, flat-rate pricing may still reflect the additional cost of UCE to
the service provider. Despite the move to flat-rate pricing by some
service providers, many email users do not have unlimited access accounts
and others must place a long distance call to retrieve email. Finally,
although it is not a major part of the pricing model today, some users are
charged on a per-megabyte basis for email stored at their service
provider's site before it is read. [16]
B. Impact on ISPs
ISPs enjoy no benefit whatsoever from UCE and they do incur significant
costs from it. This has led to vocal objections by many ISPs to UCE.
Service providers' complaints are varied. Similar to users' concerns,
unsolicited commercial email raises both "opportunity costs" and "hard
infrastructure costs" for ISPs. Service providers' soft costs include the
cost of network bandwidth and processing email. Costs such as staff time
and storage can be categorized as hard costs. In addition, ISPs,
particularly commercial online service providers, can incur a third cost
that can be loosely described as damage to reputation or customer
relations.
* Opportunity costs
ISPs pay for their Internet connectivity, usually in a "maximum capacity"
fashion. The growth of a service provider's traffic load may require an
upgrade of connectivity to handle the load adequately. So, while a
particular message, or mass emailing, may not trigger a cost to the
service provider, the traffic increase may lead to a significant cost.
[17]
* Hard costs
Hard costs to ISPs include staffing, storage and phone line availability.
Unsolicited email forces ISPs to incur additional staff costs, since many
customers want to report unsolicited email. Surges of system activity
caused by large influxes of unsolicited commercial email can cause disks
to fill up and mail to stop working until it is attended to by a staff
member. ISPs typically store email until customers pick it up. This cost
is either borne by the service provider or passed on to the user.
On systems where customers are encouraged to dialup, download their email
quickly and disconnect, large amounts of unsolicited commercial email
cause users to tie up dialup lines, thereby requiring ISPs to install more
dial up facilities. Although ISPs do not currently pay per-minute costs on
incoming calls from subscribers, they do need to ensure they have enough
telephone lines, ports and modems to support their users. The longer users
spend online downloading unsolicited commercial email, the more of these
facilities ISPs need to purchase if they are to avoid a degradation in
their quality of service.
* Damage to reputation
The reputation of a service provider can be damaged by outages, the use of
falsified return addresses and domain names by senders of UCE that result
in the ISP being blamed for or affiliated with it, and delays in service
caused by incoming UCE. They can often be blamed for unwanted UCE when the
sender inaccurately puts the ISP's name in the solicitation. Many ISPs
have reported that heavy loads of UCE have delayed or prevented other,
non-UCE email from getting through to their users. In addition to
effecting the service provider's relationship with its customers, this may
also lead to hard costs, such as new equipment purchases.
C. Impact on the Internet
Many users, ISPs and others are concerned that unsolicited commercial
email is undermining the viability and usefulness of email as a
communication tool. The variety of organizations, associations, companies
and independent Internet users who are voicing concern, crafting
guidelines, developing filtering or other anti-UCE devices, implementing
filters and looking for possible legislative solutions is a strong
indication that many on the Internet see unchecked unsolicited commercial
email as a potentially corrosive force. Direct harms to the Internet can
range from outages and crashes, due to overloads caused by bulk emailings,
to problems caused by misdirected replies, to inaccurately addressed
messages. The indirect harms caused by unsolicited commercial email are
more diverse. Due to problems with unsolicited commercial email, some ISPs
have chosen to cease participating in cooperative pass-through agreements,
interfering with the flow of information across the proprietary networks
that comprise a growing portion of the Internet.
The most dangerous, if least easily quantified cost, is the damage that
unsolicited commercial email can cause to the reputation of email. The
crashes, delays, lost messages and other problems causally related to
unsolicited commercial email may well undermine the public's willingness
to embrace this communication device for a range of functions that require
a high degree of predictability and reliability. In addition, UCE can have
a chilling effect on individuals' speech in that individuals may be
reluctant to participate in online forums and Usenet groups, or may remove
their email addresses from home pages for fear of getting their email
addresses placed on mailing lists for UCE.
In response to UCE, some service providers have taken to limiting and
blocking email from various domains. A loose consortium of service
providers rejects all incoming email from a shared "black list" of
"spammer-friendly" service providers.Some of the service providers who
find themselves on the black list actually prohibit "spamming" in their
terms of service, but because senders of UCE have taken advantage of their
computers to "bounce" and "relay" messages, they have been targeted as
part of the problem. As a result, the openness of the Internet is being
undermined and the exchange of ideas is being diminished.
Internally, service providers' rules may take even higher tolls on speech.
Many service providers' terms of services limit the sending of "spam" by
subscribers. The definition of "spam" often hinges on the bulk nature of
the message. In practice, this has limited not only unsolicited bulk
commercial email messages, but all bulk mailings, regardless of how
valuable they might be, including political and social messages. The
Constitution provides greater protection to political speech than it does
to commercial speech. In the long run such policies may negatively impact
on a wide range of speech. Without examining the content of the messages -
which would infringe on privacy - service providers are limited to using
imperfect measures such as the bulk nature of a mailing in efforts to
identify and eliminate unsolicited commercial email messages.
III. TOOLS CURRENTLY AVAILABLE TO ADDRESS UCE
A. Legal
In considering the law's role in combating UCE, it is helpful to divide
UCE into two categories, UCE that contains fraudulent claims, and UCE that
does not. Garden variety fraud that is conducted through email falls
directly under existing law. Technical fraud, on the other hand, is
defined as the variety of practices, such as relaying through third-party
mail servers, dynamically forging header information and registering false
domain names, used by those sending UCE to avoid detection, frustrate
remove requests, misdirect replies, and generally frustrate efforts by
users to prevent their continued receipt of UCE from the same sender.
Unlike UCE that contains fraudulent claims, consumer protection laws may
or may not reach technical fraud. Some service providers have successfully
pursued other avenues in litigating against technical fraud.
Federal law empowers the Federal Trade Commission (FTC) and the Department
of Justice (DOJ) to combat consumer fraud. In addition, the Computer Fraud
and Abuse Act provides the federal government with statutory authority to
investigate and prosecute those involved in damaging computers or
accessing them without authorization. Under Section 5 of the Federal Trade
Commission Act, the FTC can prosecute those engaged in deceptive or
misleading trade practices. The Consumer Fraud Division of the Justice
Department is responsible for protecting consumers against fraudulent
business practices, regardless of the medium. Similarly, states have civil
and criminal laws designed to protect consumers from fraudulent
advertising and business practices. [18]
In February 1998, the FTC, in conjunction with the U.S. Postal Inspection
Service, sent letters to more than 1,000 senders of fraudulent UCE. The
agencies had examined emails submitted by consumers and identified those
that appeared to be deceptive or fraudulent and in violation of the FTC
Act or the Postal Lottery Statute. Letters were sent to the senders of the
fraudulent UCE warning them that their activities might violate the law.
[19] In March of the same year, the FTC filed its first action against a
sender of UCE. [20] The FTC's complaint claimed that both the UCE and the
homepage of Internet Business Broadcasting, Inc. contained false and
misleading claims. The FTC continues to monitor UCE. The FTC's complaint
mailbox receives approximately 1,000 to 1,500 UCE messages from consumers
daily. [21]
While the FTC and DOJ's Consumer Protection Division, as well as the
states, are well armed to attack the problem of UCE that contains
fraudulent and deceptive advertising within the body of the message (an
enormous amount of UCE is likely to fit this definition), they have yet to
take aim at UCE that, while containing truthful statements within the
text, uses falsified header information to deceive end users into opening
it. It appears that whether or not a forged header rises to the level of a
deceptive practice for the FTC requires a case-by-case analysis. [22] If
the body of an email message is non-deceptive, but the "from" line,
"subject" line or "message header" is false the analysis would turn on
whether a reasonable consumer is likely to rely on the false statement to
her detriment. If, for example, a false "subject" or "from" line increases
the likelihood that a consumer will download or read the message, and cost
is incurred, there may be grounds to find the misrepresentation deceptive
under Section 5 of the FTC Act.
Header information is viewed (if at all) only after a message is
downloaded. Proving consumer deception based on a forged header, where the
content of the message and the addressing information revealed to the
message recipient are truthful, presents the most difficult scenario for a
finding of deception. Even if the consumer views the header, it is
possible that any inaccuracies are outweighed by the truthful information
contained in the rest of the message. For these reasons, proving that the
consumer relied upon the false header to her detriment may prove
exceedingly difficult.
In any event, proving consumer deception and fraud based on addressing and
header information is more complex than taking aim at the pyramid and get
rich quick schemes that proliferate through UCE. Until law enforcement
authorities (the FTC, DOJ or a state agency) brings successful
prosecutions against senders of UCE for using falsified addressing
information and falsified headers to deceive consumers, the legality of
the use of intentionally false header information will remain unclear.
To clarify this issue, the state of Washington recently enacted a law,
updating its consumer protection act, to prohibit explicitly the use of a
third party's domain name, the misrepresentation of message origin, and
the use of a false or misleading subject line in commercial email
messages. [23] While it is not clear how successfully the state will be
able to assert jurisdiction over most email, [24] this statute does
provide clear guidance to the state's consumer protection agency, and puts
senders of UCE on notice that accuracy in headers is required in the state
of Washington. The prescriptive nature of the accuracy requirement will
hopefully prod senders of UCE to follow appropriate Internet protocols,
and will enhance service providers' and end users' ability to filter out
unwanted messages, respond to those who send them unwanted messages, and
take the cost of dealing with replies off the plate of innocent service
providers and businesses and place them squarely on the sender of the
messages.
The ambiguity over the legality of intentionally falsified email headers,
and their damaging effect, suggests that a more proactive policy
establishing accuracy requirements should be explored at the federal
level. [25]
While consumer protection laws may or may not provide relief from
technical fraud, the courts have granted service providers protection on
other grounds. [26] The allegations contained in complaints filed by
service providers range from violations of the Federal Computer Fraud and
Abuse Act and various consumer protection statutes to common law trespass
and conversion claims. Federal statutes protecting against wire and
computer fraud [27] and racketeering [28] may offer avenues of relief.
These federal statutes and similar state statutes have been cited to
support plaintiffs' claims against the senders of unsolicited commercial
email. In addition to criminal causes of action, service providers have
claimed violations of various state laws forbidding deceptive trade
practices. [29]
Trespass violations are the most common basis for anti-UCE lawsuits by
ISPs. [30] Several lower and appellate courts have granted service
providers relief, holding that the act of relaying UCE through proprietary
computer networks - which often involves forging header information -
constitutes a trespass.
Fitting UCE neatly into existing law can be complicated. The Computer Fra
ud and Abuse Act was designed to protect confidentiality, integrity and
availability of data and systems. It addresses, for example, denial of
service attacks and computer intrusions by making it a crime to
"intentionally access a computer without authorization or exceed
authorized access." According to experts, the issues involved in
technically fraudulent UCE fit uneasily under the statute. Because email
is based on trust-based relationships and agreements to move email through
the system, proving that an individual has acted without proper
authorization may be quite difficult. Other sections of the law might
offer relief. For example, where it can be established that a sender of
UCE accessed a "protected" computer without authorization with the
"intent" to "defraud," and the losses to the entity exceeded $5,000 in a
one-year period, a civil action may succeed. [31] The Computer Fraud and
Abuse Act provides an existing framework for addressing damage to
networks, although it is largely untested in this area. While it may be
useful in its current form, changes or additions might provide a sharper
tool for addressing the issue of technically fraudulent UCE.
Although some service providers have gained temporary relief from UCE
through litigation, such lawsuits are time-consuming and
resource-intensive. The outlook from the perspective of end users is even
less promising. Few if any end-users have taken senders of UCE to court.
Despite some service providers' best efforts to litigate UCE off the
Internet, some senders of UCE are quick to target other service providers
when faced with a judgment forbidding them from targeting a specific
provider. [32] As the president of the Texas Internet Service Providers
Association stated, "Anti-UCE litigation is an important tool against UCE.
But it seems to have little lasting value against the incorrigible
'guerrilla' spammers." [33] The prevalence of "email harvesting" and
"spamming" products continues to produce an expanding pool of new UCE
marketers. The company-by-company approach of litigation appears
ill-suited to the dynamic environment of UCE.
B. Technical measures [34]
Service providers and technologists are actively devising technical
methods of addressing UCE. Most service providers employ a variety of
technical methods to identify and defeat UCE and are actively devising and
seeking out others. The majority of these efforts fit within the
definition of filtering. In addition to filters that are deployed by
service providers, mail programs are increasingly adding filters
(sometimes called "Bozo Filters") that users can deploy independently.
Filtering options have different implications for service providers and
end users. Filtering can take place at the level of the service provider
(server) or at the level of the end user (client). At both levels there
are two basic kinds of filtering, heuristic and cooperative.
Heuristic filters separate suspect messages based on a set of learned
search criteria. Heuristic filters rely on the end-user's or service
provider's ability to learn, predict or guess which messages are UCE. They
are designed to detect UCE without the cooperation of the message sender.
They are either origin-based (filtering based on DNS, IP, etc.) or
message-based (filtering based on content). For example, a heuristic
filter might eliminate all messages from a certain address or all messages
containing the phrase "make money fast." Because origin filtering occurs
before a message has been fully received by the recipient's host computer
it can reduce many costs associated with UCE. In contrast, message
filtering happens after a message is received and therefore service
providers don't escape the cost of the initial message processing.
While heuristic filters don't require the cooperation of the sender of
email, origin-based heuristic filtering is complicated by falsified header
information (DNS, IP, return address). Both origin- and message-based
filters are difficult to tailor perfectly - service providers and users
must choose between the risk of eliminating some wanted messages or
accepting some unwanted messages when choosing a filter. The rules
employed in heuristic filters can range dramatically from a simple list of
known "spammer domains" to a complex table of rules and variables based on
factors such as message origin, routing, relaying and even key words or
characters, such as multiple exclamation marks, within the header or
message text.
Cooperative filters separate messages with the cooperation of the sender.
They can be marked in some fashion, for example, through a label attached
by the sender, or they can be identified through some other recognized and
standard method, for example, a set of registered domains. A totally
effective cooperative filtering system requires a network-wide
implementation of, and adherence to, a set of standards for identifying
UCE.
Labels allow recipients or their service providers to easily identify and
handle UCE as they deem appropriate. Labels can provide a variety of
information about the message, such as whether or not it was solicited by
the recipient. Similarly, filtering enabled by sender registration allows
for easy recipient end message management based on knowledge that the
sender is registered as a UCE originator. In contrast, where filtering is
based upon recipient registration (similar to an opt-in or opt-out
system), the filtering is done by the message sender at the front-end.
This shift places the responsibility and burden of controlling UCE upon
senders. In either model of cooperative filtering, recipients can continue
to receive the UCE they want, if any. They may set their filters or lodge
their preferences to block UCE messages, or a subset thereof, or they may
specify that they accept UCE. Currently, the incentives for today's
senders of UCE to participate in such a system are not always clear - by
doing so they may generate consumer goodwill and target only interested
recipients, but they will also limit the pool of potential customers and
in some models incur direct costs.
In addition to choosing between heuristic and cooperative filtering,
service providers and users can choose where to conduct filtering - at the
server or the client level. Generally, service providers prefer
server-based filtering because it eliminates the costs associated with
processing UCE and the need for excess message storage space. Today, many
service providers maintain additional server processing capacity and disk
space to accommodate UCE messages. By using a server-based filter, a
service provider can immediately reject or delete incoming UCE messages,
thereby reducing the cost of processing and storing UCE messages.
Client-based filtering is by comparison less effective at eliminating the
costs associated with processing and storage by the service provider.
Client-based filters place control in the hands of the recipients.
Filtering does not take place until messages have been transferred to the
end-user or at least her "message store" (temporary storage space on the
server).
Client-based filtering can occur in a variety of manners. Users can
configure filters, or create separate mail boxes using their mail program,
or a service provider may offer subscribers a service whereby they perform
this function. Client-based filters require service providers to continue
to process and store UCE messages, just as they must with no filtering.
While client-based filtering may provide some benefits to service
providers (for example, they may lessen the damage to reputation caused by
UCE and indirectly limit some hard costs by lessening complaints and
storage time) they do not relieve the ISP of many other costs created by
UCE.
For end-users, the choice between server-side and client-side filtering
is, at least in degrees, a choice between ease and precision. Server-side
filtering is often the simpler option for end-users. Server-based filters
eliminate UCE without taking the time and energy of the end-user.
Client-based filters require users to update personal filters. The
economies of scale greatly favor server-based filtering. However, all
filtering raises the question, "Who decides what is filtered?"
Server-based filtering raises greater risk that the end-user's judgment
about what should be filtered is being replaced with the service
provider's decision. This may be particularly problematic where filters
are set based on factors such as similarity and quantity of messages -
which have no direct correlation with the unsolicited commercial nature of
a message, but are heuristic devices used to identify probable UCE. Broad
heuristic filtering by service providers can prevent users from receiving
some messages they want. In addition, server-based heuristic message
filtering entails having someone (a machine, not a person) other than the
specified message recipient read or scan email messages in order to
develop the criteria and weed out unwanted messages. This raises privacy
concerns.
The alternative, client-based filtering, can provide end users with a
greater degree of control over the content they receive. However, as
client-based filters come preconfigured with rules, they too raise
questions about who decides what is filtered. They can be personalized and
tailored by the user to more precisely meet the individual's needs. When
filtering takes place at the client level, the probability of missing
desired messages is diminished, and messages need not be read before they
reach the end-user. However, because it requires some degree of end-user
management, client-side filtering requires users to expend more time and
energy dealing with UCE.
As the arms race between service providers and senders of UCE continues to
escalate, sophisticated filtering systems are emerging. Unfortunately,
some of these systems have proven overly broad. For example, recent news
stories report that analysts and free speech advocates are concerned with
the preset list of words and punctuation contained in Microsoft's Outlook
'98 filter. [35] The filter blocks messages that contain phrases such as
"for free!" and blocks messages whose subject lines contain both an
exclamation point and a question mark. While the list of terms and
punctuation was developed based upon an analysis of more than 2 million
pieces of UCE, the filter may block out messages from friends and family.
Service providers, like Microsoft, and technologists are continually fine
tuning filters to avoid filtering out wanted messages.
The risk of over filtering is higher with heuristic filters. But until
most senders of UCE cooperate, heuristic filtering will probably continue
to dominate. As a consequence, some wanted mail is likely to be lost, and
bad actors will continue to relocate and falsify information, making
filtering a less effective tool against UCE.
IV. CURRENT PROPOSALS
Unsolicited commercial email has captured the attention of companies,
individual users, state and federal legislatures, technologists, trade
associations, and non-profit organizations. Each has attempted to craft
solutions. The result is a wide array of efforts ranging from proposals
for new legislation to new technical specifications and new
self-regulatory codes of conduct. The proposals reflect various
understandings of the problems associated with unsolicited commercial
email, as well as the various stake holders' inclinations of how best to
implement policy on the Internet. Gauging the potential impact of the
various proposals on UCE requires us to consider whether they will remedy
the harms suffered by the users, service providers and the Internet
itself.
A. Legislative
Current legislative proposals to address UCE take three general forms.
Three proposals pending in Congress reflect these varied approaches: [36]
* The Electronic Mailbox Protection Act of 1997 (Senate Bill 875),
introduced by Senator Robert Torricelli (D-NJ);
* The Unsolicited Commercial Electronic Mail Choice Act of 1997 (Senate
Bill 771), introduced by Senator Frank Murkowski (R-AK); and,
* The 'Netizens Protection Act of 1997 (House Bill 1748), introducedby
Representative Chris Smith (R-NJ).
The Electronic Mailbox Protection Act (Torricelli bill) seeks to enable
individuals and service providers to reclaim control over incoming
unsolicited commercial email by: [37]
* requiring header information to be accurate, which allows individuals
and service providers to deploy heuristic filters more successfully;
* prohibiting senders of UCE to interfere with the use of automatic reply
functions to respond to messages; and,
* requiring senders of UCE to comply with individual's requests to be
removed from future mailings, providing a mandatory "opt-out" for UCE.
The Unsolicited Commercial Electronic Mail Choice Act (Murkowski bill)
incorporates the features of the Electronic Mailbox Protection Act and
adds additional sections: [38]
* requiring service providers to filter email for subscribers upon
request, and respond to subscribers' and FTC's complaints with respect to
UCE; and,
* requiring senders of UCE to tag their messages with the label
"Advertisement" in the subject line, which will enable users and service
providers to deploy cooperative filtering programs that will block or
channel all UCE.
The 'Netizen's Protection Act [39] (Smith bill) prohibits the sending of
UCE. Commercial email would only be permitted where an individual has
requested it or has a preexisting and ongoing business or personal
relationship.
As this report was going to print, the Senate passed "The Unsolicited
Commercial Electronic Mail" amendments to the Consumer Anti-Slamming Act
of 1998 (Senate Bill 1618). [40] The UCE amendments were sponsored by
Senators Murkowski (R-AK) and Torricelli (D-NJ). The UCE amendments
require:
* header and routing information to be accurate;
* creators and senders of UCE to provide accurate contact information; and
* senders to comply with remove requests.
The bill provides for both FTC and state government enforcement.
1. Strengths and weaknesses of legislative approaches
The existing legislative proposals provide various degrees of relief from
the harms identified by individuals and service providers and have various
implications for speech and privacy on the Internet. The relief offered by
the various bills range from private rights of action by individuals to
statutory fines assessed by the FTC. [41] All three provide users, both
individuals and businesses, with greater control over UCE and respond to
users' concerns with the intrusiveness of UCE. The Murkowski and
Torricelli bills increase users' ability to filter out unwanted UCE and to
limit future UCE by requiring senders to abide by requests to cease
sending UCE. The Torricelli bill also responds to users' privacy concerns
by prohibiting the distribution of email lists for the purpose of UCE
where the distributor is aware that any one person does not wish to
receive UCE. The Murkowski bill enlists service providers in the battle
against UCE by requiring them to offer their users filters and to assist
the government in identifying and documenting those who violate the law.
[42] The Smith bill would prohibit all unsolicited commercial email
messages and eliminate intrusions on individual privacy.
Additional protections for privacy that could be incorporated into
legislation include limiting the collection of email addresses from public
and private spaces, enforcing rules of the forum that limit UCE, limiting
the use of email addresses harvested from the Web or chat areas, and
prohibiting the use of spamming and trolling programs (similar to the
prohibition of automatic number dialing devices by telemarketers).
To a lesser extent, the proposals respond to the cost issues raised by
users and service providers. The Smith bill's flat prohibition eliminates
the costs associated with unwanted commercial email messages. By
facilitating filtering, requiring senders of UCE not to interfere with the
ability to use the automatic return function, and to abide by "opt-out"
requests, the Torricelli and Murkowski bills each lessen the costs that
will be incurred by users. Particularly, the bills will limit the soft
costs - time, energy and interference with wanted email - often cited by
users. However, Torricelli and Murkowski do allow each sender of UCE to
send a message one time - exposing the user and service provider to an
initial expense. The labeling requirement of Murkowski's bill will allow
for effective filtering which could diminish the cost of even the first
message.
The Smith bill would eliminate the hard costs of UCE for both users and
service providers. The Torricelli and Murkowski bills will potentially
lessen them. As noted above, filtering can greatly reduce the costs,
measurable in dollars of resources, access fees, or storage costs, by
enabling ISPs to avoid processing and storing unwanted UCE messages.
Creating rules about "proper" UCE messages may increase UCE volume as
marketers begin to use a newly legitimized service. However, the opposite
effect is possible. Because responding to UCE messages will be easier,
enabling individuals to opt-out, UCE volume may decrease.
While each bill would probably lessen the volume of UCE to some degree and
facilitate service providers' and users' efforts to control it, which are
good for the Internet, their impact on the Internet may vary due to other
concerns.
Additional Considerations
2. First Amendment considerations
Legislative proposals to address UCE must be considered in the context of
First Amendment free expression guarantees.
a. Banning speech
Banning the use of an entire medium for a specific type of speech -
unsolicited commercial email - is a drastic measure. [43] The decision
that an entire method of communicating be foreclosed is one that should be
made with great caution. Caution is advised not only for the impact it
will have on the speech at issue, but also for the model it provides for
addressing speech more broadly, especially on the global medium of the
Internet. Nations with different ideas and norms about the content that
is objectionable may seek to suppress other forms of speech by banning its
transmission through email.
The U.S. courts have historically upheld narrowly crafted limits on
commercial speech. In considering a ban on unsolicited commercial email,
it is useful to examine the courts' approach to bans in other media. In
reviewing restraints on unsolicited commercial speech, the courts have
been wary of replacing private choice with government bans. However, where
privacy considerations are buttressed by measurable cost shifting and an
interference with the recipients' ability to receive desired
communications courts have upheld bans - for example, the junk fax law. It
is unclear whether the cost shifting and interference with desired
communications in the junk email context would prove compelling to a court
faced with a ban on unsolicited commercial speech.
Where other solutions that avoid regulating speech based on its content
have yet to be tested, we should be cautious in adopting a ban. In light
of the White Houses' 1997 Framework for Electronic Commerce paper that
emphasizes private choice over government imposed content decisions, and
given the constitutional issues at stake, proposals to regulate UCE should
be pursued cautiously.
b. Labeling
While compelled speech [44] regulations are rarely affirmed by the U.S.
Supreme Court, compelled labeling requirements in the commercial context
have been upheld. [45] The Court has justified the lesser protection
afforded commercial speech on the basis that the government has a
substantial interest in guaranteeing that consumers have access to
truthful, non-deceptive information regarding commercial transactions.
[46] This approach has limited the government to restricting commercial
speech in ways that specifically address this interest.
Anxious to preserve the speaker's message, the Supreme Court has said
that, "Although the State may at times 'prescribe what shall be orthodox
in commercial advertising' by requiring the dissemination of 'purely
factual and uncontroversial information,' ... outside that context it may
not compel affirmance of a belief with which the speaker disagrees." [47]
The section of the Telephone Consumer Protection Act that compels the
attaching to all faxes regardless of content the name and phone number of
the sender and the time and date sent, [48] has not been considered by the
Supreme Court.
Labeling raises fewer concerns than an outright ban on speech. Labels
would assist users and service providers in filtering out material.
However, from a U.S. perspective, similar to banning, mandatory
self-labeling as applied to non-commercial speech, may be
unconstitutional. If a solution to the UCE problem rests on mandatory
self-labeling, it is important to consider the repercussions for a global
medium.
3. Privacy and associational interests
Email may, in a relatively short time-frame, replace traditional postal
mail. Due to its increasingly central role in communication, we should
carefully think through the consequences of any proposal that would
require by law that people either "opt-out" or "opt-in." [49] Both
"opt-out" and "opt-in" lists raise privacy and associational concerns -
who holds the list, how specific is it, who gets access to it? "Opt-out"
proposals may undervalue individual privacy vis-à-vis the interests of
commercial speakers. While more protective of individuals' "right to be
let alone," "opt-in" lists raise a second privacy concern. Because lists
of individuals who wish to receive certain types of information may be far
more revealing than lists of those who do not wish to receive information,
they may invite greater misuse and abuse.
Recognizing that lists of subscribers already exist in the offline world
does not diminish the importance of questioning whether it is advisable to
pursue an approach that would generate detailed lists of people's
information preferences without establishing appropriate legal safeguards
around the information contained in such lists. Recently, the public and
policy-makers have registered increased concern with the privacy
implications of marketing lists. The consequences of traditional "opt-out"
and "opt-in" models, in light of the weak privacy protections afforded the
names on such lists, should be thought through before being adopted in
this new medium.
B. Technical
Filtering products will continue to enter the market, offering a promising
tool to users, both individuals and businesses, and to service providers
in their efforts to combat UCE. Filters, critiqued below, are fully
discussed in section III. B.
In addition to filters, technologists have developed other tools that
address problems associated with UCE. Systems that channel email into
various dynamically generated accounts have been proposed and developed.
[50] Users limit unwanted email by channeling it to an auxiliary account
or bouncing it back to the sender. When dealing with an unknown individual
or entity, users can use a distinct email address. If at any time this
address becomes a problem due to UCE, or other issues, the user can
disable it without hindering her ability to receive other email messages.
[51] This technology could potentially provide email users with great
flexibility in accepting and rejecting mail from specific senders.
A proposal that has been discussed in Internet technical circles would
build upon the channeling concept and create a separate channel for bulk
email, the Bulk Mail Transfer Protocol (BMTP). [52] BMTP is intended as an
alternative to SMTP, the Internet's Simple Mail Transfer Protocol. By
creating a separate channel for bulk email, the protocol would allow end
users to register their desire to accept or reject bulk email with their
service provider. It would also allow service providers to determine
whether to provide bulk mail service to their email subscribers at all.
The BMTP also provides for authentication, which would facilitate the
implementation of payment schemes where the sender of bulk mail reimburses
the recipient or service provider.
Another tool for filtering UCE is referral networks. Acting as a trust
mechanism of sorts, referral networks would allow users to reject or
separate email messages that have or lack appropriate referral
certificates. Users could obtain certificates from other users to whom
they wish to send email, or from clearinghouses operated by trusted third
parties. [53]
Another set of technical proposals to address UCE would require senders to
pay recipients for UCE through either cash or computation. [54] Cash
payments accompanying email messages could be made with electronic money.
Recipients would have the option of refunding the money to senders of
desirable email, but could keep the payment from a sender of UCE. Some
have noted that email payment systems would require fundamental changes in
the email system, including a large financial infrastructure for what is
likely to be relatively low-cost transactions. The system would impose a
marginal cost for email transmission on UCE senders, so there would be a
disincentive to initiating large bulk disseminations (they would become a
lot more expensive), therefore UCE volume would probably decrease. A
variant of the cash payment scheme would require payments of computation.
Senders of UCE could be required to compute a mathematical function before
transferring their messages. Such a requirement would place a significant
burden on the computer processing capacity of UCE senders, so fewer
messages would be sent. The success of such systems would hinge on
wide-spread adoption.
Digital signatures are also being used to address UCE by preventing domain
name spoofing. The software, which uses digital signatures to tie domain
names to addresses, tackles the problem of UCE with intentionally altered
domain names. [55] By providing a mechanism to authenticate domain names,
the software will help identify UCE whose true origin has been disguised
by the sender. Addressing this common UCE practice will facilitate the
detection and filtration of spoofed messages - messages that are often
UCE.
1. Strengths and Weaknesses
Filters offer users, both individuals and businesses, tools to control the
inflow of UCE and protect privacy by limiting intrusions into the email
inbox. Unfortunately, some of the filtering systems have proven overly
broad. Using them may put wanted email at risk. The risk of over-filtering
is higher with heuristic filters. However, until senders of UCE cooperate,
heuristic filtering will continue to dominate. Senders of UCE are unlikely
to voluntarily provide information useful for filtering. In fact, many of
those who send UCE actively seek ways to hide their identity and disguise
the origin of their message to thwart filtering efforts. The prevalence of
forged headers makes effective filtering difficult. The development of
products that verify domains of origin may assist in filtering efforts.
Server-based filtering (both heuristic and cooperative) helps to eliminate
the costs of handling UCE incurred by service providers. While
client-based filtering can provide end users with some relief from soft
costs (annoyance, infringement on time, interference with wanted email) it
does not limit the hard costs of storage and processing incurred by
service providers and users. In addition, because client-based filtering
requires some degree of end user management, it does not eliminate all the
soft costs of UCE.
While limiting service providers' costs, broad heuristic filtering by
service providers can prevent users from receiving some messages they want
- taking a toll on the free flow of information. In addition, server-based
heuristic message filtering entails having someone (a machine, not a
person) other than the specified message recipient read or scan email
messages. This raises privacy concerns. Filtering is unlikely to affect
the overall volume of UCE; therefore it will have little impact on the
long term health of the Internet.
Channeling email offers a method for individuals to exercise control over
their inbox at the front-end and if they encounter problems at any time
down the line. The ability to revoke an email address offers individuals a
method of turning off UCE. It can alleviate users' costs of handling UCE.
The method used to create the channels may require more computing
resources and potentially slow down email. Depending on the number of
channels an individual opens, this could be complex to manage and require
the user to devote additional time and energy to its upkeep. Referral
networks raise similar concerns about computing resources, interference
with the sending and receipt of email and resources needed for management.
Overall, technology provides some useful tools for addressing UCE, but
currently the tools may require some tailoring and regular upgrades. While
various tools can be deployed successfully with or without cooperation
from UCE senders (channeling and heuristic filters function in the absence
of cooperation), in general, cooperation would increase the utility of
technical solutions to combat UCE. The interaction of legislative
proposals that require accuracy, domain name verification technology, and
heuristic filters holds promise for more consistent and effective
filtering. Similarly, labeling requirements found in legislative proposals
would greatly ease the task of filtering messages. Without accuracy and/or
some cooperation by senders of UCE, users and service providers will have
to continue the arms race against UCE and risk the loss of valuable
messages.
C. Self-regulatory efforts to address UCE
Many service providers forbid the use of their systems to send UCE. They
seek to enforce their terms of service regarding UCE upon both their
subscribers and those sending email to their subscribers or across their
network. A bill recently introduced in California would allow service
providers to bring a civil action against any person violating their terms
of service with regard to UCE. [56] To buttress prohibitions on UCE in
terms of service agreements, service providers can use technical means to
identify and block out-going UCE.
Service providers are potentially able to limit UCE through a number of
other self-help or self-regulatory methods. Methods that are currently
used to deter UCE include turning off the relay function on routers, which
prevents non-account holders from using the service providers system to
send UCE. A collaborative effort to limit the ability of UCE senders to
co-opt service providers resources is the Real-Time Black Hole (RTBH)
initiative. Run by a single individual but subscribed to by several
service providers, the RTBH provides a continually updated "black list" of
"spammer-friendly" service providers. Service providers seeking to limit
the UCE travelling through their system reject all incoming email from
those on the black list. Unfortunately, this effort has had some negative
repercussions for service providers who, for a variety of reasons, have
found themselves on the blacklist. The impact on such service providers
and their non-UCE sending subscribers can be serious. [57] To be removed
from the black list a service provider must comply with a set of
requirements set out by RTBH.
Backbone peering agreements have been identified as another potential
avenue for alleviating the cost shifting associated with spam. Peering
agreements are the contractual agreements between network providers that
establish the terms under which data packets, including email, will move
from one network to another. Currently these agreements do not, in
general, reflect or compensate the network or service provider based on
the level of traffic. However, it is possible to use peering agreements to
allocate cost in ways that reflect network use. In addition to efforts by
individual service providers, several associations and organizations have
developed self-regulatory proposals to address UCE. Only one of the
proposals mentioned in this section of the report is fully operational.
Consumers Connect, Inc. (CCI) offers a free list cleaning service to
marketers who send UCE. The service began in June 1997 and is currently
used by end-users registered with CCI's opt-out list. Marketers can send
their lists to CCI, which will remove the names of individuals who have
opted-out and messages that have returned undeliverable replies. CCI does
not release the addresses of either end users or of the companies who use
the service.
The Direct Marketing Association has proposed a global opt-out database
called electronic mail preference system (e-MPS) modeled on their existing
mail preference service. Individuals could register their desire not to
receive UCE. The service, as proposed, would allow individuals to limit
UCE completely, or object to select categories of UCE (for example sports,
gardening).
The Association for Internet Marketing (TAIM) is working with software
developers to eliminate the stealth features of bulk mailing software
which make it possible for UCE to get past filters. TAIM wants to set up
an opt-out list for users who do not wish to receive UCE and believes that
users should be compensated for receiving UCE. In addition, TAIM believes
that service providers should receive a commission for each piece of UCE
that is received and examined by an end user.
In contrast to the opt-out approach of e-MPS, CCI, and TAIM,
ChooseYourMail provides an opt-in system to address commercial email.
Under the ChooseYourMail proposal, users register their email address if
they wish to receive commercial email. Email addresses are not made
public. If an individual opts-in to receive commercial email, or a subset
of commercial email, ChooseYourMail will deliver targeted messages to
users on behalf of marketers. Only ChooseYourMail would have access to the
list; marketers would pay to distribute their messages to addresses on
the list. Service providers would be compensated for accepting messages
and would be able to control the timing of message delivery. The
ChooseYourMail opt-in program has gained support from ISP trade
associations and is currently in test with regional Internet service
providers across the country.
1. Strengths and weaknesses
The opt-in approach and to a lesser extent the various opt-out approaches
provide individuals and businesses with added control over UCE. While
providing individuals with a tool to assert their "right to be let alone,"
both "opt-out" and "opt-in" approaches raise privacy concerns - who holds
the list, how specific is it, who gets access to it? Furthermore, both
these approaches work only if senders of UCE are interested in respecting
the wishes of the people registering to these lists.
Opt-out and opt-in approaches on their own do not eliminate the costs
incurred by service providers, although they may limit costs to users. The
payment schemes envisioned by the various proposals would address service
providers' concerns with the cost of UCE, however it is unclear whether
they would substantially affect the cost to service providers who were
intermediaries but not end destinations.
The success of an opt-out approach greatly depends on how widely it is
used. In a sense, opt-out and opt-in are similar to cooperative filtering:
therein lies the issue. Opt-out and opt-in lists make the sender of UCE
responsible for verifying that individuals are willing or unwilling to
accept UCE (filter). Both opt-out and opt-in lists are most effective if
many or most senders of UCE cooperate. In today's world, this assumption
flies in the face of experience. Today, some senders of UCE employ
software to avoid filters, flagrantly violate terms of service statements
of service providers limiting UCE, and ignore individuals' requests to be
spared future UCE. It is not presently clear what portion of the senders
of unwanted UCE would cooperate with voluntary opt-in or opt-out efforts
in the future. Until the senders of UCE change their behavior, it is
unlikely that opt-in and opt-out systems will provide full relief from
UCE. For, unlike the legal and technical proposals, they require senders
of UCE to participate actively.
The efforts of individual service providers to limit UCE originating and
travelling through their systems have had some impact on UCE. The
organizing effort of the RTBH has brought some structure to these efforts
and enabled individual service providers to leverage their efforts. Part
of their success resides in their ability to take unilateral action.
Establishing and enforcing terms of service agreements and black listing
those who provide senders of UCE with a gateway to the system do not
require the cooperation of those sending UCE. But, like heuristic
filtering, such approaches may be overbroad.
To date self-regulatory efforts that require the cooperation of UCE
senders has provided limited relief from UCE. However, the Working Group
believes that over time, as increased pressure is brought upon senders of
UCE, self-regulation may take new forms and may prove more useful.
V. CONCLUSIONS & RECOMMENDATIONS
Providing users and service providers more control over the inflow of UCE
is important to the development of email and a short-term imperative. The
Ad-Hoc Working Group believes that tools and public policies should
advocate end-user control over UCE. Therefore, the Ad-Hoc Working Group
recommends that:
* Technical tools and public policies that allow individuals to indicate
their desire to receive or not receive UCE and exercise greater control
over incoming email messages should be pursued.
Filtering offers a useful tool to both users and service providers, acting
as agents for end-users, for controlling UCE. However, forged header
information and the lack of other definitive methods of distinguishing UCE
from other mail make filtering difficult. Therefore, the Ad-Hoc Working
Group recommends that:
* Technical measures and public policies should be pursued that prevent
and/or prohibit the use of fraudulent headers to send unsolicited
commercial email messages. Such measures will greatly assist users and
service providers in managing UCE.
While filtering enabled by accurate headers, and potentially other
information identifying UCE, will help users and service providers
minimize some of the costs associated with processing, storing, and
reading UCE, the current cost-structure of the email system does not
allocate costs in a way that reflects resource usage. A failure to address
cost-shifting will leave a central consumer and service provider concern
unaddressed. Therefore, the Ad-Hoc Working Group recommends that:
* Further efforts to examine the cost structure of the email system with
respect to UCE should continue to be explored by the private sector.
Stand alone self-regulatory initiatives generally require the cooperation
of all relevant parties. In this case, senders of UCE must participate.
Some senders of UCE have shown little interest in the process of
self-regulation. Recognizing that the environment is likely to change in
ways more conducive to self-regulatory efforts, the Ad-Hoc Working Group
believes that:
* Self-regulatory efforts to create opt-out or opt-in programs should
proceed.
Recognizing that a large portion of UCE is fraudulent - containing
deceptive messages - and actively sent in a fashion that thwarts
individuals' and service providers attempts to avoid it, the Ad-Hoc
Working Group recommends that:
* Increased efforts to eliminate email fraud be undertaken, and the use of
inaccurate and misleading header information be considered an attempt to
defraud consumers.
The Ad-Hoc Working Group urges the Federal Trade Commission, the
Department of Justice and relevant state offices to undertake enforcement
actions targeting these practices and to clarify their jurisdiction
through test cases and other appropriate methods.
The email systems' global nature coupled with its use of standard
protocols suggests that the technical community may provide the most
effective and scalable tools for addressing the problems associated with
UCE. Therefore, the Ad-Hoc Working Group urges:
* Relevant standard setting bodies to continue to search for technical
standards and specifications that will: assist users in controlling
incoming email; more fairly allocate the costs of UCE; and ease the burden
UCE places on the network.
The Internet is a dynamic environment. Efforts to solve the problems
associated with UCE should be monitored. The Working Group hopes that this
report provides a baseline of knowledge and guidance to those seeking to
reduce the burdens associated with UCE. Working Group participants look
forward to working with others to address this important issue.
The following organizations and companies participated in meetings of the
Ad-Hoc Working Group on Unsolicited Commercial Email:
AMERICA ONLINE
1101 Connecticut Ave. NW, Ste. 400,
Washington DC 20036 tel
202-530-7878 fax 202-530-7879
www.aol.com
AMERICAN CIVIL LIBERTIES UNION
122 Maryland Ave. NE,
Washington DC 20002
tel 202-544-1681 fax 202-546-0738
www.aclu.org
THE ASSOCIATION FOR INTERNET MARKETING
5530 Wisconsin Ave., Ste. 1110, Chevy
Chase MD 20815
tel 301-656-1166 fax 301-656-9008
www.taim.org
ASSOCIATION OF NATIONAL ADVERTISERS
700 11th St. NW, Ste. 650,
Washington DC 20001
202-626-7800 fax 202-626-6161
www.ana.net
AT&T
295 N. Maple Ave.,
Basking Ridge NJ 07920
fax 908-221-8484
www.att.com
CATO INSTITUTE
1000 Massachusetts Ave. NW,
Washington DC 20001
tel 202-842-0200 fax 202-842-3490
www.cato.org
CENTER FOR DEMOCRACY AND TECHNOLOGY
1634 Eye St. NW, 11th floor,
Washington DC 20006
tel 202-637-9800 fax 202-637-0968
www.cdt.org
CHOOSEYOURMAIL.COM
162 N. Franklin, Chicago IL 60606
tel 800-767-6606 fax 312-236-4092
www.chooseyourmail.com
COALITION AGAINST UNSOLICITED COMMERCIAL EMAIL
www.cauce.org
comments@cauce.org
COMMERCIAL INTERNET EXCHANGE
2222 Q Street NW, Ste. 51,
Washington DC 20008
tel 202-797-8743
771 Ackley Rd., Cincinnati OH 45255
tel 520-751-8114
www.cix.org
COMPUSERVE
P.O. Box 20212, Columbia OH 43220
tel 614-538-4133 fax 614-326-0560
www.compuserve.com
CONSUMERS CONNECT
P.O. Box 5339,
Arlington VA 22205
tel 703-908-9125 fax 703-908-0186
www.ctct.com/ct_main.htm
CYBER PROMOTIONS
DIRECT MARKETING ASSOCIATION
1111 19th St. NW, Ste. 1100,
Washington DC 20036
tel 202-861-2407 fax 202-955-0085
www.the-dma.org
EF-FLORIDA
2608 N. Cleveland Cir.,
Tampa FL 33609
tel 813-871-6052 fax
813-870-0823
www.efflorida.org
scott@efflorida.org
EF-TEXAS
P.O. Box 4570, Austin TX 78765
www.eftexas.org
FLORIDA INTERNET SERVICE PROVIDERS
ASSOCIATION
1045 E. Atlantic Ave., Ste. 206, Delray Beach FL 33483
tel 561-266-9438 fax 561-266-9017
www.fispa.org
HOTMAIL
1290 Oakmead Pkwy.,
Sunnyvale CA 94086
tel 408-222-7030 fax 408-222-7310
www.hotmail.com
IBM
1301 K St. NW, Ste. 1100, Washington, DC 20005
tel 202-515-5062 fax 202-515-5194
www.ibm.com
INTERNET ALLIANCE
8403 Colesville Rd., Ste. 865,
Silver Spring MD 20910 tel 301-495-4955
fax 301-495-4959
www.internetalliance.com
INTERNET MAIL CONSORTIUM
127 Segre Pl.,
Santa Cruz CA 95060
tel 408-426-9827
www.imc.org
INTERNET SERVICE
PROVIDERS' CONSORTIUM
100 Washington Ave. South, Ste. 2200,
Minneapolis MN
55401
tel 310-827-8466
www.ispc.org
Yossi Matias
Tel Aviv University,
Department of Computer Science,
on leave from Lucent Technologies - Bell Labs
Schriber Bldg. Rm. 305, Tel Aviv 69978, ISRAEL
tel +972-3-6406353 fax
+972-3-6409357
matias+cdt@math.tau.ac.il
MCI
1801 Pennsylvania Ave. NW,
Washington DC 20006
tel 202-887-3378
www.mci.com/community
MICROSOFT CORPORATION
21 Dupont Cir. NW, Washington DC 20036
tel 202-293-0890
www.microsoft.com
NETCOM ON-LINE COMMUNICATION SERVICES, INC.
3030 Tisch Way, San Jose CA 95128
tel 408-881-3227 fax 408-881-3153
www.netcom.com
OMRON ADVANCED SYSTEMS, INC.
3945 Freedom Cir., Ste. 700,
Santa Clara CA 95054
tel 408-727-6644 fax
408-272-5540
www.omron.com/oas/index.htm
PEOPLE FOR THE AMERICAN WAY
200 M St. NW, Ste. 400, Washington DC 20036
tel 202-467-4999 fax 202-293-2672
www.pfaw.org
VOTERS TELECOMMUNICATIONS WATCH
www.vtw.org
WASHINGTON ASSOCIATION
OF INTERNET SERVICE PROVIDERS
9445 37th Ave. SW, Seattle WA 98126
tel 206-933-0164 fax 206-935-1923
www.waisp.org
AMERICA ONLINE
1101 Connecticut Ave. NW, Ste. 400,
Washington DC 20036
tel 202-530-7878 fax 202-530-7879
www.aol.com
AMERICAN CIVIL LIBERTIES UNION
122 Maryland Ave. NE,
Washington DC 20002
tel 202-544-1681 fax 202-546-0738
www.aclu.org
THE ASSOCIATION FOR INTERNET MARKETING
5530 Wisconsin Ave., Ste. 1110,
Chevy Chase MD 20815
tel 301-656-1166 fax 301-656-9008
www.taim.org
ASSOCIATION OF NATIONAL ADVERTISERS
700 11th St. NW, Ste. 650,
Washington DC 20001
202-626-7800 fax 202-626-6161
www.ana.net
AT&T
295 N. Maple Ave., Basking Ridge NJ 07920
fax 908-221-8484
www.att.com
CATO INSTITUTE
1000 Massachusetts Ave. NW,
Washington DC 20001
tel 202-842-0200 fax 202-842-3490
www.cato.org
CENTER FOR DEMOCRACY AND TECHNOLOGY
1634 Eye St. NW, 11th
floor, Washington DC 20006
tel 202-637-9800 fax 202-637-0968
www.cdt.org
CHOOSEYOURMAIL.COM
162 N. Franklin, Chicago IL 60606
tel 800-767-6606 fax 312-236-4092
www.chooseyourmail.com
COALITION AGAINST UNSOLICITED COMMERCIAL EMAIL
www.cauce.org
comments@cauce.org
COMMERCIAL
INTERNET EXCHANGE
2222 Q Street NW, Ste. 51, Washington DC 20008
tel 202-797-8743
771 Ackley Rd., Cincinnati OH 45255
tel 520-751-8114
www.cix.org
COMPUSERVE
P.O. Box 20212, Columbia OH 43220
tel 614-538-4133 fax 614-326-0560
www.compuserve.com
CONSUMERS CONNECT
P.O. Box 5339, Arlington VA 22205
tel 703-908-9125 fax 703-908-0186
www.ctct.com/ct_main.htm
CYBER PROMOTIONS
DIRECT MARKETING ASSOCIATION
1111 19th St. NW, Ste. 1100, Washington DC 20036
tel 202-861-2407 fax 202-955-0085
www.the-dma.org
EF-FLORIDA
2608 N. Cleveland Cir., Tampa FL 33609
tel 813-871-6052 fax
813-870-0823
www.efflorida.org
scott@efflorida.org
EF-TEXAS
P.O. Box 4570, Austin TX 78765
www.eftexas.org
FLORIDA INTERNET SERVICE PROVIDERS ASSOCIATION
1045 E. Atlantic Ave., Ste. 206, Delray Beach FL 33483
tel 561-266-9438 fax 561-266-9017
www.fispa.org
HOTMAIL
1290 Oakmead Pkwy.,
Sunnyvale CA 94086
tel 408-222-7030 fax 408-222-7310
www.hotmail.com
IBM
1301 K St. NW, Ste. 1100, Washington, DC 20005
tel 202-515-5062 fax 202-515-5194
www.ibm.com
INTERNET ALLIANCE
8403 Colesville Rd., Ste. 865,
Silver Spring MD 20910
tel 301-495-4955 fax 301-495-4959
www.internetalliance.com
INTERNET MAIL CONSORTIUM
127 SegrePl.,
Santa Cruz CA 95060
tel 408-426-9827
www.imc.org
INTERNET SERVICE
PROVIDERS' CONSORTIUM
100 Washington Ave. South, Ste. 2200,
Minneapolis MN 55401
tel 310-827-8466
www.ispc.org
Yossi Matias
Tel Aviv University,
Department of Computer Science,
on leave from Lucent Technologies - Bell Labs
Schriber Bldg. Rm. 305, Tel Aviv 69978,
ISRAEL
tel +972-3-6406353 fax
+972-3-6409357
matias+cdt@math.tau.ac.il
MCI
1801 Pennsylvania Ave. NW,
Washington DC 20006
tel 202-887-3378
www.mci.com/community
MICROSOFT CORPORATION
21 Dupont Cir. NW,
Washington DC 20036
tel 202-293-0890
www.microsoft.com
NETCOM ON-LINE COMMUNICATION SERVICES, INC.
3030 Tisch Way,
San Jose CA 95128
tel 408-881-3227 fax 408-881-3153
www.netcom.com
OMRON ADVANCED SYSTEMS, INC.
3945 Freedom Cir., Ste. 700,
Santa Clara CA 95054
tel 408-727-6644 fax
408-272-5540
www.omron.com/oas/index.htm
PEOPLE FOR THE AMERICAN WAY
200 M St. NW, Ste. 400, Washington DC 20036
tel 202-467-4999 fax 202-293-2672
www.pfaw.org
VOTERS TELECOMMUNICATIONS WATCH
www.vtw.org
WASHINGTON ASSOCIATION
OF INTERNET SERVICE PROVIDERS
9445 37th Ave. SW, Seattle WA 98126
tel 206-933-0164 fax 206-935-1923
www.waisp.org
FEDERAL TRADE COMMISSION
6th St. & Pennsylvania Ave. NW,
Washington DC 20580
tel 202-326-2222 fax 202-326-2496
www.ftc.gov
MARY J. CULNAN
Associate Professor
Georgetown University, School of Business,
Washington DC 20057-1008
tel 202-687-3802
DEPARTMENT OF JUSTICE
1100 Vermont Ave. NW, Washington DC 20530
tel 202-514-2007 fax
202-514-4371
www.usdoj.gov
LYNN MCNULTY
RSA Data Security, Inc.
1420 Spring Hill Road, Ste. 600,
McLean VA 22102
tel 703-917-6632 fax
703-448-8208
JOHN MORRIS
Jenner & Block
601 13th St. NW, Washington DC
20005
tel 202-639-6000 fax 202-639-6066
OFFICE OF SENATOR FRANK MURKOWSKI (R-AK)
322 Hart Senate Office Building,
Washington DC 20510
tel 202-224-6665 fax 202-224-5301
www.senate.gov/~murkowski
RON PLESSER
Piper & Marbury
1200 19th St. NW,
Washington DC 20036
tel 202-861-3900 fax 202-223-2085
OFFICE OF REPRESENTATIVE CHRIS SMITH (R-NJ)
2370 Rayburn House Office Building,
Washington DC 20510
tel 202-225-3765
www.house.gov/chrissmith
OFFICE OF SENATOR ROBERT TORRICELLI (D-NJ)
113 Dirksen Senate Office Building,
Washington DC 20510
tel 202-224-3224 fax 202-224-8567
www.senate.gov/~torricelli
[1] The range of approaches includes seeking legal redress, establishing
joint industry association guidelines to set parameters on appropriate
behavior, providing user and ISP-based filtering tools, and various
vigilante efforts. The complete record of comments submitted to the FTC
about UCE can be found at .
[2] The political organization Informed Voter is using email to contact
potential Democratic voters. In response to criticism, Robert Barnes, a
principle in the firm, agreed that he was "just trying to leverage one of
the most powerful mass media available today to reach voters who would
want to be contacted." Janet Kornblum, Political Mailings Criticized As
Spam, CNET NEWS.COM (April 22, 1998)
; and Carla Marinucci,
Candidates Canvassing By E-Mail: State Democrats Harness Technology, SAN
FRANCISCO CHRON. (April 18,
1998).
[3] 117 S. Ct. 2329 (1997).
[4] Attempts to regulate the availability of encryption on the Internet
highlight the frustrations that regulators may experience. As many
scholars and advocates have pointed out, national attempts to restrict the
availability of encryption are likely to be ineffective. For if even one
jurisdiction (or one network in one jurisdiction) fails to restrict
encryption, individuals world wide will be able to access it over the
Internet and use it.
[5] EF-Austin, EF-Florida, and Voters Telecommunications Watch, Comments
to the Federal Trade Commission on Unsolicited Commercial Email, June 2,
1997. The cost issues addressed in this section are largely taken from
these comments, by permission.
[6] Based on an informal survey of 11 ISPs' expenses related to UCE. As
much as $2 of a monthly service bill may be attributed to UCE. Daniel P.
Dern, Spam Costs Internet Millions Every Month, CMP NET,(May 4, 1998)
.
[7] On the state's interest in protecting privacy, see: Florida Bar v.
Went For It, Inc., 515 U.S. 618 (1995) (upholding temporal ban on direct
mail solicitation by personal injury lawyers). "[A] special benefit of the
privacy all citizens enjoy within their own walls, which the State may
legislate to protect, is an ability to avoid intrusions." Id. at 625
(citations omitted); Rowan v. Post Office Dept., 397 U.S. 728, 736-37
(1970) (upholding postal regulation of offensive mail).
[8] Numerous state and local laws govern door-to-door solicitations. The
U.S. Supreme Court has recognized both the legitimate privacy interests of
individuals and the role that door-to-door communication plays in
inexpensively disseminating ideas. Martin v. Struthers, 319 U.S. 141,
145-46 (1943). The Court has held that door-to-door solicitations can be
governed by time, place, and manner restrictions but not banned. Id. at
149. But see, Breard v. Alexandria, 341 U.S. 622 (1951) (Unsolicited
commercial door-to-door solicitation ban upheld). The Court has held that
commercial speech could be subject to stricter controls. Central Hudson
Gas & Elec. Corp. v. Public Serv. Comm'n, 447 U.S. 557, 564-65 (1980).
However, more recent decisions have emphasized the First Amendment
protections of truthful and non-misleading commercial speech. See, 44
Liquormart, Inc. v. Rhode Island, 517 U.S. 484 (1996); City of Cincinnati
v. Discovery Network, Inc., 507 U.S. 410 (1993).
[9] Interestingly, a number of proposals currently under consideration by
Congress attempt to address the problem of direct mail by limiting the
sale and rental of personal information by entities who collect it. See,
Personal Information Privacy Act of 1997, S. 600, 105th Cong. (1997)
(introduced by Sen. Feinstein); H.R. 98, 105th Cong. (1997) (introduced by
Rep. Vento); and, H.R. 1287, 105th Cong. (1997) (introduced by Rep.
Franks). Other proposals aimed at limiting direct mail have focused on
limiting the mail itself.
[10] See, Telephone Consumer Protection Act (TCPA) of 1991, 47 U.S.C. §
227 (1994).
[11] Id. The TCPA prohibits unsolicited facsimiles that contain
advertisements. 47 U.S.C. § 227(b)(1)(C) (1994).
[12] Cf. Bolger v. Youngs Drug Products Corp., 463 U.S. 60 (1983), finding
that, "the short, though regular journeys from mail box to trash can . . .
is an acceptable burden (on individual privacy) . . . so far as the
Constitution is concerned." Id. at 72 (citation omitted); State by
Humphrey v. Casino Marketing Group, 491 N.W.2d 882 (Minn. 1992), cert.
denied, 507 U.S. 1006 (1993), holding that "the residential telephone is
uniquely intrusive. The caller . . . is able to enter the home for
expressive purposes without contending with such barriers as time or
distance, doors or fences. . . . Unlike the unsolicited bulk mail
advertisement found in the mail collected at the resident's leisure, the
ring of the telephone mandates prompt response, interrupting a meal, a
restful soak in the bathtub, even intruding on the intimacy of the
bedroom." Id. at 888.
[13] The report accompanying the TCPA details additional costs associated
with automatic dialing systems. Findings include:
* automated calls are placed to lines reserved for emergency purposes,
such as hospitals and fire and police stations; . . .
* the automated calls fill the entire tape of an answering machine,
preventing other callers from leaving messages;
* the automated calls will not disconnect the line for a long time after
the called party hangs up the phone, thereby preventing the called party
from placing his or her own calls; * automated calls do not respond to
human voice commands to disconnect the phone, especially in times of
emergency;
* some automatic dialers will dial numbers in sequence, thereby tying up
all the lines of a business and preventing any outgoing calls; and
* unsolicited calls placed to fax machines, and cellular or paging
telephone numbers often impose a cost on the called party . . . .
S.Rep. No. 102-178, reprinted in 1991 U.S.C.C.A.N. at 1969.
[14] EF-Austin, EF-Florida, and Voters Telecommunications Watch, Comments
to the Federal Trade Commission on Unsolicited Commercial Email, June 2,
1997. Over 2,700 people answered the user survey, and 60 ISPs answered the
institutional survey conducted for the Workshop.
[15] Joe Keely of Senator Frank Murkowski's (R-AK) office reported many
complaints about the cost of unsolicited commercial email due to the
expense of connect time in the state of Alaska (as high as $6 per hour).
The VTW survey received varied answers for what connect time costs users,
ranging from $0.50 to $4 per hour.
[16] The range of responses stated that this cost is approximately $1 per
megabyte.
[17] Informal survey findings reported in CMP NET reveal a range of
expenditures and a range of costs. Dern, supra note 6. Sample responses:
MindSpring Enterprises Inc., Atlanta: Twenty to 25 percent of the incoming
email at this midsize ISP is spam, said Harry Smoak, MindSpring's director
of Net abuse and terms of service policy. To support Usenet activity,
MindSpring currently has about $500,000 in equipment. "If there was no
spam, we could probably do with one-third to one-half this equipment," Mr.
Smoak said. E-mail and Usenet spam consume about one to two T1s (1.5
megabits per second to 3 Mbps) of bandwidth between MindSpring and its
upstream Internet backbone. Also used up is the time spent
byone-and-a-half engineers on spam-related abuse issues.
Erols Internet Services, Springfield, Va.: This midsize ISP spends $75,000
in salaries for three full-time employees whose sole responsibility is to
deal with email abuse issues. "I would say it's among the reasons we
recently had to up our prices," said an Erols system administrator. "Fully
10 percent to 15 percent of our e-mail disk space is taken up by incoming
spam sent to Erols' customers. I estimate that probably five percent of
the total traffic through Erols' networks is spam being bounced off our
servers onto the rest of the Internet."
GTE Internetworking, Cambridge, Mass.: "There are typically two to four
people working full time on spam," said a spokeswoman at this ISP. "GTE
has to deal both with spammers and spam itself."
America Online Inc., Dulles, Va.: Of the average of 14 million email
messages coming from the Internet to AOL daily, five to 30 percent are
spam, an AOL spokeswoman said. "We have to scale the network to handle
this," she said. "This costs the members, especially those who pay hourly
rates." She declined to elaborate.
[18] See generally, People v. Lipsitz, 663 N.Y.S.2d 468, (N.Y. Sup. Ct.
1997). The New York State Court held that the state attorney general can
pursue senders of UCE who violate consumer protection statutes. The
defense argued that only federal courts could exercise jurisdiction in
such matters. Lipsitz was enjoined from sending UCE advertisements, and
ordered to pay restitution to the consumers whom he and his company had
defrauded.
[19] Federal Trade Commission, FTC to Junk E-mailers: "No Scamming While
You're Spamming" (Feb. 5, 1998) .
[20] Complaint for permanent injunction and other equitable relief, FTC v.
Maher, et al. (visited June 25, 1998)
.
[21] The FTC maintains the address uce@ftc.gov for this purpose. The
Junkemail.org Web site contains a questionnaire designed to aid consumers
in identifying fraudulent UCE and sending it to the FTC.
. The National Fraud Information Center also
handles complaints about UCE. .
[22] The content of this paragraph and the following paragraph have been
checked with the Federal Trade Commission staff and they consider it to be
an accurate statement.
[23] 1998 Wa. ALS 149; 1998 Wa. Ch. 149; 1997 Wa. HB 2752. The statute
also creates the Select Task Force on Commercial Electronic Mail Messages.
The task force is directed to identify technical, legal, and cost issues
in relation to the transmission and receipt of commercial electronic mail
messages, evaluate the sufficiency of existing laws, review efforts of the
federal and other state governments, and prepare a report identifying
policy options and recommend legislation if needed.
[24] State regulations that unduly burden interstate commerce are
unconstitutional under the so-called "dormant" commerce clause. See, e.g.,
Kassel v. Consolidated Freightways Corp. of Del., 450 U.S. 662 (1981). A
New York District Court has held that broad regulation of the Internet by
a state is unconstitutional under this standard. ALA v. Pataki, No. 97
Civ. 0222 (S.D.N.Y. June 20, 1997) (order granting preliminary
injunction).
[25] Without accuracy it is difficult to track down and identify those
engaged in online commercial fraud, it is extremely difficult for service
providers and users to filter out mail from unwanted senders, and it is
nearly impossible for besieged end users to tell senders of UCE to remove
them from their list. Accuracy requirements need not run afoul of the
First Amendment protections for anonymous speech. Most anonymous
remailers forbid the use of their services for UCE and accurately identify
the source of the message as an anonymous individual. These services are
infrequently used by senders of UCE.
[26] Companies and individuals whose domain names and addresses have been
used by senders of UCE have also found relief through litigation. See,
Parker v. C.N. Enterprises, No. 97-06273 (Tex. Travis County Dist. Ct.
Nov 10, 1997) (visited June 26, 1998)
(ordering injunctive
relief and damages against a sender of UCE for using the plaintiff's
domain name, "flowers.com").
[27] See, 18 U.S.C. § 1343 (1997); and the Computer Fraud and Abuse Act,
18 U.S.C. § 1030 (1997). Analysis isavailable courtesy of the Justice
Department's Computer Crime and Intellectual Property Section (CCIP).
Computer Crime and Intellectual Property Section, U.S. Dept. of Justice,
National Information Infrastructure Protection Act of 1996: Legislative
Analysis (last modified June 20,
1997).
[28] 18 U.S.C. § 1962(c) (1997).
[29] E.g. false, deceptive or misleading advertising. See, VA. CODE ANN. §
18.2-178 (1997) (criminal) and VA. CODE ANN. § 59.1-200A(8) (1997)
(civil); and CAL. BUS. & PROF. CODE § 17500 (criminal) and CAL. BUS. &
PROF. CODE § 321 (civil).
[30] See, Cyber Promotions, Inc. v. America Online, 948 F. Supp 456 (E.D.
Pa 1996) (visited June 26, 1998)
; Compuserve, Inc. v. Cyber
Promotions, Inc., No. C2-96-1070 (S.D. Ohio May 7, 1997) (visited June
26, 1998) (final consent
order by stipulation); Concentric Network Corp. v. Wallace, No. C-96
20829-RMW(EAI) (N.D. Cal. Nov. 5, 1996) (visited June 26, 1998)
(stipulated judgement and
permanent injunction).
[31] 18 U.S.C. § 1030(a)(4), (g) (1997).
[32] The myriad of suits filed against Cyber Promotions by various service
providers including AOL, Compuserve, Bigfoot Partners and Concentric
Network attests to this problem. Recently, Craig Nowak, who was sued by a
group of service providers and enjoined by a Texas court from sending
further UCE to them, was identified in a case by Hotmail as engaged in
sending UCE. Mr. Nowak is negotiating a consent decree in which he will
once again promise not to engage in sending UCE.
[33] Gene Crick, President, Electronic Frontiers Texas, President, Texas
Internet Service Providers Association, Director, Texas Community Resource
Center Internet Access Project, and Editor/Publisher of the Texas
Telecommunications Journal, commenting upon the case of Craig Nowak.
[34] For a full exploration of this issue see, P. Hoffman and D. Crocker,
Unsolicited Bulk Email: Mechanisms for Control, Internet Mail Consortium
Report: UBE-SOL, IMCR-005, October 13, 1997
.
[35] Lisa M. Bowman, Outlook 98 Filter Goes Too Far, Some Say, ZDNN (Apr.
3, 1998) .
[36] A fourth bill, the Data Privacy Act of 1997 (House Bill 2368)
introduced by Representative W.L. Tauzin (R-LA) contains a section
addressing unsolicited commercial email, and a fifth bill is likely to be
introduced by Rep. Merrill Cook (R-CA).
[37] For a copy of the bill and a full explanation of its contents see
appendix.
[38] For a copy of the bill and a full explanation of its contents see
appendix.
[39] For a copy of the bill and a full explanation of its contents see
appendix.
[40] The Anti-slamming Amendments Act of 1998, H.R. 3888, introduced by
Rep. Tauzin (R-LA) takes a similar approach to addressing UCE.
[41] Delving into the appropriate remedial structure for a law addressing
UCE is beyond the scope of this report. However, several participants in
the working group have noted that private rights of action empower
individuals with a tool and, if appropriate statutory relief is
structured, an incentive to pursue claims. On the downside, others have
noted that the private right of action provided under the TCPA is hindered
by the rules of small claims courts and the obstacles to bringing class
actions, which would offer a better deterrent. In addition, service
providers have voiced some concern with the discovery requests that they
could potentially face if thousands of individuals are seeking information
from them about the origin of a piece of UCE. Needless to say, in addition
to structuring the appropriate rules a statutory approach should carefully
structure an enforcement system that provides maximum relief, deterrence
and incentives to pursue claims.
[42] Several service providers have objected to these sections of the bill
because they would burden them with additional administrative
andcomplaint-handling responsibilities.
[43] Working Group members have taken various positions on pending
legislation, including H.R. 1748, which would ban UCE. Some have
supported H.R. 1748; others have opposed it. Some participants have
refrained from taking public positions on legislation at all.
[44] Mandatory author self-labeling requirements are compelled speech and
raise First Amendment concerns. In general, any regulation that compels
speech is content-based and subject to strict scrutiny. Mandatory labeling
of all Internet content would also be content-based regulation, because it
would compel the speaker to make "statements of fact the speaker would
rather avoid." Hurley v. Irish-American Gay Lesbian and Bisexual Group of
Boston, Inc., 515 U.S. 557, 573 (1995), citing McIntyre v. Ohio Elections
Comm'n, 514 U.S. 334, 341-342 (1995) and Riley v. National Federation of
Blind of N.C., Inc., 487 U.S. 781, 797-798 (1988). See also, McIntyre, 514
U.S. at 345 ("[E]ven though this provision [prohibiting anonymous campaign
literature] applies evenhandedly to advocates of differing viewpoints, it
is a direct regulation of the content of speech").
[45] The commercial speech doctrine does not apply to most communication
on the Internet. Commercial speech is a highly limited category, applying
generally only to advertising and similar speech. See Rubin v. Coors
Brewing Co., 514 U.S. 476, 482 (1995) ("[A] test based on '"the
commonsense distinction between speech proposing a commercial transaction,
which occurs in an area traditionally subject to government regulation,
and other varieties of speech'"), quoting Central Hudson v. Public
Services Comm'n of New York, 447 U.S. 557, 562 (1980) (citation omitted).
Further, expression does not become commercial speech merely because it is
sold or involved in a financial transaction. See, Bolger v. Youngs Drug
Products Corp., 463 U.S. 60, 66 (1983).
[46] See Consolidated Edison, 497 U.S. at 563.
[47] See Hurley 515 U.S. at 573 (quoting Zauderer v. Office of
Disciplinary Counsel of Supreme Court of Ohio, 471 U.S. 626, 651 (1985)).
[48] 47 U.S.C. § 227(d)(1)(B).
[49] In addition, if email becomes the dominant method of communicating
(becoming the 21st century post office and postbox) there may be some
other interesting issues. For example, the Court struck down a law that
required people who wished to receive "communist literature" to sign-up at
the post office - otherwise it would be "filtered" out for them. Lamont
v. Postmaster General, 381 U.S. 301 (1965). Requirements that force us to
"list" ourselves as interested in particular information may invite some
trouble down the line.
[50] Robert J. Hall, How to Avoid Unwanted Email, COMM. OF THE ASS'N FOR
COMPUTING (ACM) Vol. 41, No. 3, March 1998, at 88
.
A longer version is available from the author at
.
[51] Luc ent's Personalized Web Assistant (LPWA) has provided such a
feature to its users since June 1997, for email addresses provided via the
Web. Lucent Technologies, The Lucent Personalized Web Assistant (last
modified May 7, 1998) . The use of such
a feature in general email communications has also been explored. E.
Gabber et al., Curbing Junk E-Mail via Secure Classification, PROC. OF
SECOND INT'L CONF. ON FINANCIAL CRYPTOGRAPHY, February 1998 (visited June
26, 1998) .
[52] The Internet Mail Consortium provides an organized listing of the
various IETF proposals to address UCE. Internet Mail Consortium, IETF
Working Groups (visited June 26, 1998) .
[53] Lorrie Faith Cranor and Brian A. LaMacchia, Spam!, COMM. OF THE ASS'N
FOR COMPUTING (ACM) (forthcoming) (visited June 26, 1998)
.
[54] See, P. Hoffman and D. Crocker, Unsolicited Bulk Email: Mechanisms
for Control, Internet Mail Consortium Report: UBE-SOL, IMCR-005, October
13, 1997 .
[55] In October 1997, RSA Data Security gave the Internet Software
Consortium (ISC) a free technology license to encrypt and verify domain
name system addresses on the fly.
[56] Internet Consumer Protection Act of 1998, A.B. 1629, 1997-98 Sess.
(Cal.). Introduced by Assemblyman Gary Miller (R-60th Dist.), this bill
was supported unanimously by the consumer protection committee of the
California Assembly. The committee heard testimony in support of the
legislation from representatives of the ISP Consortium, AOL, Netcom,
CAUCE, and concerned citizens. The ACLU sent a letter of opposition to the
committee. The bill must pass through the judiciary committee and the
appropriations committee before it will be voted on by the whole assembly.
[57] One service provider sent the following message to a company whose
name had fraudulently been used in UCE and therefore had been erroneously
black-holed:
It has come to our attention that you are providing service to
[name deleted], who are operating the web site [name deleted]. This
company is offering an opt-out service to prevent Internet abuse, or
"spam". While we laud the efforts of your customer we must ask you to
disconnect service to him. Opt-out lists are forbidden by our Acceptable
Use Policy, due to the fact that they may cause many sites to block
[our]...networks. This global problem is effecting all of our customers,
and action must be taken. There have been numerous complaints, and more
importantly, black-holing (denial of data traffic) of our domain and IP
space....Please disconnect this customer within the next 24 hours or we
will be forced to take other action.
Email, 12 June 1998, (author's and recipient's names omitted) (on file
with the Center for Democracy and Technology).
BACK to Main Junkmail Page